Computer Networking On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses? /27 /30 /28 /29 /27 /30 /28 /29 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In a synchronous modem, the receive equalizer is known as impairment equalizer adaptive equalizer statistical equalizer compromise equalizer None of these impairment equalizer adaptive equalizer statistical equalizer compromise equalizer None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What does the command o/r 0x2142 provide? It is used to bypass the configuration in NVRAM. It is used to restart the router. It is used to view the lost password. It is used to enter ROM Monitor mode. It is used to bypass the configuration in NVRAM. It is used to restart the router. It is used to view the lost password. It is used to enter ROM Monitor mode. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Data are sent over pin _____ of the EIA-232 interface. All of these 4 3 2 All of these 4 3 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What frequency range is used for microwave communications, satellite and radar? Extremely High Frequency :30,000 MHz Low Frequency : 30 kHz to 300 kHz None of these Medium Frequency : 300 kHz to 3 MHz Super High Frequency : 3000 MHz to 30000 MHz Extremely High Frequency :30,000 MHz Low Frequency : 30 kHz to 300 kHz None of these Medium Frequency : 300 kHz to 3 MHz Super High Frequency : 3000 MHz to 30000 MHz ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols are used to configure trunking on a switch?1. VLAN Trunk Protocol2. VLAN3. 802.1Q4. ISL 3 and 4 1 only 3 only 1, 3 and 4 3 and 4 1 only 3 only 1, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP